This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Remap prefix to screens | |
set -g prefix C-a | |
bind C-a send-prefix | |
unbind C-b | |
# Quality of line stuff | |
set -g history-limit 10000 | |
set -g allow-rename off |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Centreon 19.04 allows attackers to execute arbitrary OS commands via the Command Line field | |
of main.php?p=60807&type=4 (aka the Configuration > Commands > Discovery screen). | |
------------------------------------------ | |
[Additional Information] | |
Once one has logged into Centreon: | |
1. navigate to: Configuration > Commands > Discovery OR http://ip-address/centreon/main.php?p=60807&type=4 | |
2. in the "Command Line" section put a command: e.g. "cat /etc/passwd" without quotes. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### Keybase proof | |
I hereby claim: | |
* I am sinfulz on github. | |
* I am sinfulz (https://keybase.io/sinfulz) on keybase. | |
* I have a public key ASAIN_yZRtaA0eeOArIx_slbk4JImcaiwNl9UZui94676Ao | |
To claim this, I am signing this object: |